QUESTION 101Which two features can be used to extend VRFs across a campus? (Choose two.)

A. 802.1q trunksB. LDPC. MPLS TED. GREE. port channels

Answer: AD

QUESTION 102You are asked to design a large campus network that will be using multicast for data transport. Which feature should be enabled at the Layer 2 access edge for host-only ports?

A. PortFastB. BPDU guardC. PIM-SMD. PIM query interval

Answer: A

QUESTION 103After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network – %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing.From a design perspective, what was not taken into account prior to implementing the solution?

A. The neighboring routers cannot respond within the specified hold time.B. The interface on the router that is the source of the tunnel is down.C. The interface on the neighboring router that is the source of the tunnel is down.D. The router is learning the route to the tunnel destination address using the tunnel interface.E. The tunnel interface on the router is not receiving any keepalives within the specified hold time.

Answer: D

QUESTION 104A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?

A. Multicast packets from both applications are flooded to all Layer 2 ports in a segment where amulticast receiver is located.B. Multicast packets from both applications are flooded to ports where one multicast receiver fromone application is located.C. Only one multicast stream is received at the port where the receivers from both applications are located.D. Both multicast senders will always receive the multicast packets from the other multicast application.E. The routers doing PIM-SM cannot distinguish between the two multicast applications.

Answer: B

QUESTION 105Which design concern should be accounted for in all Layer 3 virtualization technologies?

QUESTION 106A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?

A. 224.0.0.60B. 232.192.0.60C. 239.128.0.60D. 239.193.0.60

Answer: D

QUESTION 107Refer to the exhibit. You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.)

A. When router B fragments packets after the encryption, router C must reassemble these fragmentedpackets.B. When router B fragments packets before the encryption, router C must reassemble these fragmentedpackets.C. When router B fragments packets after the encryption, the endpoint 2 must reassemble thesefragmented packets.D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmentedpackets.E. When router A fragments packets, router C must reassemble these fragmented packets.F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets.

Answer: ADF

QUESTION 108When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.)

A. recommended for high availabilityB. requires all sites to have dual Internet connectionsC. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directlyD. hub sites must connect to both DMVPN cloudsE. will only work with single-tier headend architecture

Answer: AE

QUESTION 110When creating a network design, which one of these options provides for basic Layer 2 client isolation to prevent broadcast traffic exposure?

A. SVIB. VLANC. routed portD. edge port

Answer: B

QUESTION 111When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)

QUESTION 112While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?

A. STPB. MSTC. PVRSTPD. PVSTP+

Answer: D

QUESTION 113As a service provider you must support a Layer 2 virtualization protocol that does not include the use of label switching. Which option can meet this design requirement?

A. VPLSB. VRF-LiteC. QinQD. 802.3ad

Answer: C

QUESTION 114Which two techniques are used in a network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.)

QUESTION 115When designing a WAN that will be carrying real-time traffic, what are two important reasons toconsider serialization delay? (Choose two.)

A. Serialization delays are variable because they depend on the line rate of the interface and on the typeof the packet being serialized.B. Serialization delay depends not only on the line rate of the interface but also on the size of the packet.C. Serialization delays are invariable because they depend only on the line rate of the interface.D. Serialization delays are variable because they depend only on the size of the packet being serialized.E. Serialization delay is the time required to transmit the packet on the physical media.

Answer: BE

QUESTION 116In a redesign of a multiple-area network, it is recommended that summarization is to be implemented. For redundancy requirements, summarization is done at multiple locations for each summary. Some customers now complain of higher latency and performance issues for a server hosted in the summarized area.What design issues should be considered when creating the summarization?

QUESTION 119What is a key role for the access layer in a hierarchical network design?

A. The access layer provides a security, QoS, and policy trust boundary.B. The access layer provides an aggregation point for services and applications.C. The access layer serves as a distribution point for services and applications.D. The access layer can be used to aggregate remote users.

Answer: A

QUESTION 120You have been asked to deploy BGP across a satellite link system to a small number of retail stores.What must you do to successfully deploy BGP in this situation?

A. configure all the BGP peering sessions across the satellite links as EBGPB. set the BGP hold timer to under one secondC. configure the initial window size, maximum MTU, and TCP keepalive parametersD. manually configure static routes to back up BGP across the satellite link

Answer: C

Lead2pass offers the latest 352-001 PDF and VCE dumps with new version VCE player for free download, and the new 352-001 dump ensures your exam 100% pass.